Artwork

Content provided by Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Calculus of IT - Episode 9 - 1/24/2024 - "IT Survival Guide Chapter 10 - Security"

2:43:51
 
Distribuie
 

Manage episode 397573548 series 3538190
Content provided by Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

In Episode 9, Mike and Nate, along with returning guest Kevin Dushney and special guest Bob Litterer (CISO at Teradyne), discuss Chapter 10 of the IT Survival Guide, which is focused on the philosophy and initial activities behind the construction of a security stack at your new company. Though this chapter was written in late 2019, the paradigm introduced is still a pivotal moment in the start of your IT journey. Bob helps us uncover new insights into other considerations when it comes to security and how the industry at large is evolving.

We take a deep dive into AI as a pure revenue concept (which it is) and how one day it may be used for the betterment of humankind, how far away we may be from an alternative Hollywood, and the other usual stuff.

Podcast References:

The Markup.org report

The Pew Report

Post-chapter 10 analysis/reflection questions:

  1. Which perspective - technology, governance, or growth - should be prioritized in the first 90 days, and why?
  2. What challenges might arise in balancing security needs with business productivity, and how would you address them?
  3. From a technology and governance perspective, which phase 1 objectives should be the focus?
  4. How would you unite stakeholders to build consensus around a new security strategy?
  5. How would you prioritize addressing security gaps in systems, policies, procedures, and cultural awareness?
  6. Which stakeholder groups might resist changes in security approaches, and how would you gain their buy-in?
  7. What key questions need answers from stakeholders when planning your initial security strategy?
  8. How do you balance differing views on security within your strategy while ensuring adequate protection of the organization's assets?
  9. Which foundational elements of your security plan do you prioritize in the short term, and what is your implementation plan?
  10. How do you decide between using Managed Security Services Providers (MSSPs) and building internal security capabilities?
  11. Discuss the role of governance in ensuring adherence to security policies, procedures, and controls.
  12. As an IT leader, how do you stay updated on security threats and technologies and incorporate this knowledge into your planning?
  13. What approaches for raising security awareness have you found effective in educating the business and gaining stakeholder buy-in?

Support the Show.

The Calculus of IT website - https://www.thecoit.us
"The New IT Leader's Survival Guide" Book - https://www.longwalk.consulting/library
"The Calculus of IT" Book - https://www.longwalk.consulting/library
The COIT Merchandise Store - https://thecoit.myspreadshop.com
Buy us a Beer!! - https://www.buymeacoffee.com/thecalculusofit
Youtube - @thecalculusofit
TikTok - @thecalculusofit
Instagram - https://www.instagram.com/thecalculusofit/
Discord - https://discord.com/invite/A5grWHyH
Email - nate@thecoit.us
Email - mike@thecoit.us

  continue reading

Capitole

1. Technical Idiocy (00:00:00)

2. Preamble: Meta Pixel (00:04:42)

3. Nate Reads Chapter 10 (00:28:00)

4. Chapter 10 Concludes - General Banter Continues (00:51:15)

29 episoade

Artwork
iconDistribuie
 
Manage episode 397573548 series 3538190
Content provided by Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Nathan McBride & Michael Crispin, Nathan McBride, and Michael Crispin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

In Episode 9, Mike and Nate, along with returning guest Kevin Dushney and special guest Bob Litterer (CISO at Teradyne), discuss Chapter 10 of the IT Survival Guide, which is focused on the philosophy and initial activities behind the construction of a security stack at your new company. Though this chapter was written in late 2019, the paradigm introduced is still a pivotal moment in the start of your IT journey. Bob helps us uncover new insights into other considerations when it comes to security and how the industry at large is evolving.

We take a deep dive into AI as a pure revenue concept (which it is) and how one day it may be used for the betterment of humankind, how far away we may be from an alternative Hollywood, and the other usual stuff.

Podcast References:

The Markup.org report

The Pew Report

Post-chapter 10 analysis/reflection questions:

  1. Which perspective - technology, governance, or growth - should be prioritized in the first 90 days, and why?
  2. What challenges might arise in balancing security needs with business productivity, and how would you address them?
  3. From a technology and governance perspective, which phase 1 objectives should be the focus?
  4. How would you unite stakeholders to build consensus around a new security strategy?
  5. How would you prioritize addressing security gaps in systems, policies, procedures, and cultural awareness?
  6. Which stakeholder groups might resist changes in security approaches, and how would you gain their buy-in?
  7. What key questions need answers from stakeholders when planning your initial security strategy?
  8. How do you balance differing views on security within your strategy while ensuring adequate protection of the organization's assets?
  9. Which foundational elements of your security plan do you prioritize in the short term, and what is your implementation plan?
  10. How do you decide between using Managed Security Services Providers (MSSPs) and building internal security capabilities?
  11. Discuss the role of governance in ensuring adherence to security policies, procedures, and controls.
  12. As an IT leader, how do you stay updated on security threats and technologies and incorporate this knowledge into your planning?
  13. What approaches for raising security awareness have you found effective in educating the business and gaining stakeholder buy-in?

Support the Show.

The Calculus of IT website - https://www.thecoit.us
"The New IT Leader's Survival Guide" Book - https://www.longwalk.consulting/library
"The Calculus of IT" Book - https://www.longwalk.consulting/library
The COIT Merchandise Store - https://thecoit.myspreadshop.com
Buy us a Beer!! - https://www.buymeacoffee.com/thecalculusofit
Youtube - @thecalculusofit
TikTok - @thecalculusofit
Instagram - https://www.instagram.com/thecalculusofit/
Discord - https://discord.com/invite/A5grWHyH
Email - nate@thecoit.us
Email - mike@thecoit.us

  continue reading

Capitole

1. Technical Idiocy (00:00:00)

2. Preamble: Meta Pixel (00:04:42)

3. Nate Reads Chapter 10 (00:28:00)

4. Chapter 10 Concludes - General Banter Continues (00:51:15)

29 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință